What are the broader implications when it comes to access, security, vulnerabilities, etc?